Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
AVISPA
biblio
A Lightweight Authentication and Key Agreement Protocol for Secure Fog-to-Fog Collaboration
Submitted by grigby1 on Fri, 09/16/2022 - 4:39pm
computer architecture
collaboration
security
IoT
pubcrawl
resilience
Conferences
performance evaluation
Scalability
authentication
Protocols
Fog computing
AVISPA
Internet security
Resiliency
authentication protocol
biblio
A secure and lightweight three-factor authentication and key generation scheme for direct communication between healthcare professionals and patient’s WMSN
Submitted by grigby1 on Thu, 07/08/2021 - 3:51pm
AVISPA
e-health
formal verification
Human behavior
Human Factors
performance evaluation
pubcrawl
Three-factor authentication
two factor authentication
biblio
A secure three-factor authentication and biometrics-based key agreement scheme for TMIS with user anonymity
Submitted by grigby1 on Thu, 01/28/2021 - 2:03pm
Servers
medical servers
Medical services
message authentication
Metrics
password
pubcrawl
remote monitoring
resilience
Resiliency
medical information systems
Smart card
smart cards
telecare medical information systems
telemedicine
three factor user authentication
Three-factor authentication
TMIS
user anonymity
user/server communication security
e-health systems
authentication
authorisation
AVISPA
biometrics
biometrics (access control)
biometrics based key agreement
composability
diseases
e-health
anonymity
ECG
file servers
formal security verification tool AVISPA
formal verification
health care
health systems
healthcare services
Human behavior
biblio
Machine Learning Based Novel Approach for Intrusion Detection and Prevention System: A Tool Based Verification
Submitted by aekwall on Mon, 05/11/2020 - 11:13am
authentication
unique features
proactive intrusion prevention
prevention system
power supply
multiple techniques
minimum bandwidth
limited energy
HLPSL.
AVISPA tool
AVISPA
industrial environments
WSN
intrusion prevention
formal verification
military applications
Intrusion Detection
tools
network intrusion detection
Metrics
wireless sensor networks
Wireless Sensor Network
composability
pubcrawl
Resiliency
machine learning
learning (artificial intelligence)
Protocols
Cryptographic Protocols
Servers
computer network security
biblio
Visiting Mobile Node Authentication Protocol for Proxy MIPv6-Based NEtwork MObility
Submitted by grigby1 on Wed, 05/09/2018 - 3:01pm
PMIPv6
VMN
Visiting Mobile Nodes
telecommunication network routing
Servers
security
Router Systems Security
Router Systems
Resiliency
resilience
pubcrawl
Proxy MIPv6-Based NEtwork MObility
Protocols
authentication
NEMO-BSP
NEMO-Basic Support Protocol
NEMO
mobility management (mobile radio)
mobile router
mobile radio
mobile nodes
mobile node authentication protocol
Metrics
Handover
Cryptographic Protocols
AVISPA
biblio
An IDMS approach towards privacy and new requirements in IoT
Submitted by K_Hooper on Wed, 02/14/2018 - 12:05pm
mobile clients
user-centric
service provider
Scalability
Resiliency
pubcrawl
private information
privacy
personal authentication device
PAD
OAuth
Mobility
mobile radio
AVISPA
IoT identity management system
Internet of Things
IDMS
Identity provider IoT
Identity management
Human behavior
EAP
DTLS
domain
data privacy
Cryptographic Protocols
Cardinality
biblio
An efficient remote mutual authentication scheme using smart mobile phone over insecure networks
Submitted by grigby1 on Tue, 03/07/2017 - 1:37pm
session key agreement scheme
password change operation
Protocols
pubcrawl170109
remote mutual authentication protocol
remote server
secure connection
security attacks
Servers
OFMC
smart cards
smart mobile phone
Smart Mobile Phones
smart phones
telecommunication security
user anonymity
user-server impersonation attacks
Law
AVISPA
AVISPA simulator tool
CL-AtSe back-ends
Computer crime
Cryptographic Protocols
insecure networks
insider attack
key secrecy
authentication
MAS
message authentication
mobile application software
mobile computing
mobile radio
mobile user
off-line identity-password guessing attacks
biblio
Formal Verification of Wireless Sensor Key Exchange Protocol Using AVISPA
Submitted by BrandonB on Wed, 05/06/2015 - 2:43pm
IP-based wireless sensor networks
WSNs
wireless sensor networks
wireless sensor key exchange protocol
Wireless communication
security
Protocols
lightweight key exchange protocol WSKE
IPSEC-6LoWPAN networks
IPsec
authentication
IP networks
Internet key exchange version 2 mechanism
internet
IKEv2
formal verification
end-to-end security
Cryptographic Protocols
Communication system security
AVISPA
biblio
A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme
Submitted by BrandonB on Mon, 05/04/2015 - 2:49pm
Mobile communication
telecommunication security
security
secure authentication procedure
proxy mobile IPv6
Protocols
PMIPV6 based network mobility scheme
network mobility
NEMO
MR
mobility management (mobile radio)
mobile router
mobile platforms
mobile computing
AAA servers
mobile access gateway
MAG
LMAIFPNEMO
lightweight mutual authentication mechanism
Internet access
IFP-NEMO protocol
Handover
AVISPA software
AVISPA
automated validation of internet security protocols and applications
authentication authorization and accounting
authentication